WordPress News

WordCamp Minneapolis 2017

WordCamp Minneapolis / St. Paul 2017 – Double the Fun

By Adam Warner

I’ve just returned from WordCamp Minneapolis / St. Paul, and what a camp it was! This year’s event was held at the Humphrey School of Public Affairs and Hanson Hall buildings at the University of Minnesota West Bank.

An impressive 450 attendees descended on the Twin Cities to learn and share all things WordPress. If you look close at the image below, you’ll see two planes in addition to the one I was on, all landing in Minneapolis. I’d like to think there were some other excited WordCampers coming in at the same time as my own flight.

SiteLock was among the 450 attendees, and we also  sponsored the event. We were there in full force with copious amounts of swag and a $200 Amazon gift card for our raffle.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordCamp
WordCamp Boston 2017

WordCamp Boston 2017 – WordPress Strong

By Adam Warner

SiteLock sponsored and attended WordCamp Boston 2017 this past weekend. It was our second year in attendance, and as expected, it was a great event! In this post, we share some of our experiences from the event, including a slight hiccup and how we overcame it.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordCamp
WordPress Mental Health

The State of Mental Health Awareness in the WordPress Community

By Adam Warner

Mental health awareness initiatives have increased in the WordPress community, and in the tech community as a whole, in recent years. This has been welcomed by many, especially since 2007 when the CDC (Centers for Disease Control) surveyed adults in 37 States about their attitudes toward mental illness and found that:

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  Community
Creating the WordPress community

Fostering the WordPress Community We Want

By Adam Warner

The desire to be part of a community is a human instinct. Whether it’s a tribe, village, city, or even the WordPress community, we have an innate need to group together. The benefits of being in a community far outweigh being alone, but there are also challenges to operating within a group, and the worldwide WordPress community isn’t immune.

Creating the WordPress community

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  Community
WCEU WordCamp Europe 2017

WordCamp Europe 2017 Recap

By Adam Warner

After a year of waiting and months of planning, SiteLock finally landed in Paris, France for our second year at WordCamp Europe! We sponsored the event again this year and were overwhelmed by the attendance of 1,900 people from 79 countries. Not to mention the 1,000 viewers who live-streamed the event, totaling a count of 2,900 WordPress enthusiasts!

For those of you who were at the show, you probably met at least one person in red from the SiteLock crew. From left to right, we sent these handsome folks below (note, I’m the one in the middle!).

SiteLock President Neill Feather, Executive Vice President Tom Serani, and Evangelists Logan Kipp and Adam Warner, and Inside Channel Developer Brandon Goldberg

For those of you who couldn’t make it, we’ve recapped the event with some of our favorite moments below.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordCamp
What is WordPress Multisite

What is WordPress Multisite and Who Should Use It?

By Adam Warner

In this post, we’re going to look at the Multisite feature of WordPress. We’ll learn what it is, when to use it, and when not to use it. We’ll also cover a few important best practices to keep in mind when running WordPress Multisite.

When you enable Multisite in WordPress, you have the ability to create a network of individual WordPress sites on a single installation of the software. Enabling, configuring, managing, and growing a WordPress Multisite-powered website is not for novice users, but depending on the goals of your business, it just might be the perfect solution.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordPress security
WordPress Speed Optimization

10 WordPress Website Performance Best Practices

By Logan Kipp

If you’re reading this article, it’s almost certainly not the first website performance article you’ve browsed. Let’s be honest, practically everyone has an opinion on the matter and you would probably deforest half the Amazon rainforest if you tried to print each article you’ve come across. Since we all want to save the habitat of the endangered Amazonian Wapuu and skip the conjecture, I’d like to share with you my 10 WordPress website performance best practices that provide gains you can actually measure.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordPress security
How to Install and Configure the SiteLock Plugin for WordPress

How to Install and Configure the SiteLock Plugin (Video Tutorial)

By Adam Warner

In our Beginner’s Guide to the SiteLock Plugin for WordPress, we showed you the benefits of proactively preventing malware and hacking attempts on your WordPress website. In this video, you’ll learn exactly how to install and configure our plugin and connect it to a SiteLock account.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordPress security
WordCamp Jacksonville 2017

WordCamp Jacksonville – A True All Things WordPress Conference

By Adam Warner

Last week I attended and spoke at the second annual WordCamp Jacksonville. It was my first time attending this camp and it didn’t disappoint. As the title of this post suggests, it seemed there was something for every type of WordPress user, and that’s not always an easy feat to achieve.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordCamp
threat intercept

Threat Intercept: Malvertising via JavaScript Redirects

By Michael Veenstra
This article was co-authored by Product Evangelist Logan Kipp.

THREAT SUMMARY

High Threat
WordPress Website Security Threat Level
Learn More

Category: Malvertising / Malicious Redirect

Trend Identified: 5/17/2017

CVE ID: N/A

Trend Name: Trend El Mirage

Vector: Application Vulnerability, Multiple

The threat rating was determined using the following metrics:

Complexity:

MEDIUM: The vector used to infect websites appears to be through the use of leaked compromised passwords.

Confidentiality Impact:

HIGH: This infection provides complete control of the target website, including database content.

Integrity Impact:

HIGH: This infection provides the adversary administrator-level access to impacted website applications, making total data loss a possibility.


The SiteLock Research team has identified a trend of JavaScript injections causing the visitors of affected websites to be automatically redirected to advertisements without the knowledge of the website owner.

This infection impacts WordPress sites across all versions, but the affected websites identified at this time all show evidence of recent infection by a fake WordPress plugin that performed malicious redirects as well. The previous infections were determined to have been distributed via a botnet using a database of leaked login credentials, suggesting this new attack may similarly be accessing sites via compromised WordPress administrator credentials.

The malicious code becomes embedded into existing JavaScript files in the affected sites, ensuring that the code will be executed in visitors’ browsers regardless of their activity on the site.

The code as it appears in the injected files is obfuscated, which means it’s written in a way that makes it difficult for humans to read. This is the malicious script as it appears in the affected files:

WordPress Malvertising via JavaScript Redirects

Obfuscated JavaScript responsible for malicious redirects.

After decoding this file, we are able to determine the specifics of how it behaves:

WordPress Injected Javascript Malware

Decoded and formatted version of the injected JavaScript.

The redirect takes place immediately after loading a page including the infected JavaScript, after which a cookie is stored in the visitor’s browser called “csrf_uid” that expires three days after being created. The naming of this cookie is an attempt to hide in plain sight, as CSRF (Cross-Site Request Forgery) protection cookies are commonplace in many websites across the internet. While the cookie is active, no further redirects will take place. This provides two benefits to the attacker. First, the ad network will be less likely to identify suspicious behavior and flag the attacker’s account. Secondly, it makes the redirects more difficult to identify and duplicate by the sites’ owners and administrators, decreasing the likelihood that the specific infection will be identified and removed.

What is a website cookie?
Cookies are pieces of data that websites store in your browser for later use. Sites use cookies for a number of legitimate reasons, from storing login sessions to analytics of how users are browsing the site.

Fortunately, despite the nature of these redirects, no malicious activity has been identified in the advertisements themselves, meaning a system infection occurring after these redirects is unlikely.

Because the attack vector of this infection appears to be leaked login credentials from unrelated data breaches, it is very important to ensure that strong password policies are in place on your site. Avoid using the same password across multiple locations to prevent one service’s breach from exposing your accounts elsewhere. If you determine that your data has been part of a publicized breach, change your passwords immediately. Also, consider using a breach checker to identify if your email address has been associated with any public data breaches in the past, as this would be a major indicator that password changes will be necessary for your accounts.

If you are a website owner and you believe your website has been impacted by this infection, contact SiteLock as soon as possible at 855.378.6200. Our SMART scan began rapidly identifying and cleaning instances of this infection within 24 hours of being initially identified.

Tags:   WordPress blog, WordPress security blog, WordCamps, WordPress news, WordPress hacks
Categories:  WordPress security